Final Exam - CCNA Discovery: Networking for Home and Small Businesses (Version 4.0) (2)


What is the purpose of pop-up blocker software?
It detects and removes spyware.
It detects and removes viruses.
It prevents the display of advertisement windows.
It removes unwanted e-mail.

2
Which device is often configured to act as both a DHCP client and a DHCP server?
home PC
ISP modem
wireless-enabled laptop
integrated services router

3
As an assignment, a computer science student needs to present data in binary format. What are the two possible values that the student can use? (Choose two.)
0
1
2
A
F

4
What is a major characteristic of asymmetric Internet service?
Download speeds and upload speeds are equal.
Download speeds are faster than upload speeds.
Data traffic speeds are faster than voice traffic speeds.
Used when consistently uploading large amounts of graphics, video and multimedia traffic.

5
Which installation option should be chosen when the current operating system is too damaged to work properly?
upgrade
multi-boot
clean install
virtualization

6
What measurement is commonly used to describe communication speed when transferring data?
bps
cps
Hz
MB

7
A college network administrator is planning a wireless LAN to provide service in the student lounge and outdoor patio. The requirements include a range of at least 80 meters and a speed of 30 Mb/s. Which wireless LAN standard meets these requirements?
802.11
802.11a
802.11b
802.11g

8
After attaching four PCs to the switch ports, configuring the SSID and setting authentication properties for a small office network, a technician successfully tests the connectivity of all PCs that are connected to the switch and WLAN. A firewall is then configured on the device prior to connecting it to the Internet. What type of network device includes all of the described features?
switch
ISR router
firewall appliance
standalone wireless access point

9
Which statement is true concerning stateful packet inspection?
Access is permitted based on IP addresses of the source and destination devices.
Access is permitted based on the MAC addresses of the source and destination devices.
Access is permitted only if the type of application that is attempting to reach the internal host is allowed.
Access is permitted only if it is a legitimate response to a request from an internal host.

10


Refer to the exhibit. Assume that the exhibited output is from a host that is connected to a Linksys integrated router. What is the first thing that should be checked while using a bottom-up troubleshooting approach?
the default gateway on the host
the IP address on the host
the IP address on the router
the link status LED on the front of the router
the subnet mask on the host

11
What does the term "attenuation" mean in data communication?
loss of signal strength as distance increases
time for a signal to reach its destination
leakage of signals from one cable pair to another
strengthening of a signal by a networking device

12


Refer to the graphic. Assume that the command output is from a wireless DHCP client that is connected to a Linksys integrated router. What can be deduced from the output?
The wireless connection is good.
The WEP key or SSID needs to be checked.
The DHCP configuration on the router needs to be checked.
The wireless NIC driver or the NIC itself needs to be reinstalled.

13
Which transport layer protocol is used when an application requires acknowledgment that data has been delivered?
FTP
TCP
UDP
RTP
SMTP

14
What is an ISP?
It is a standards body that develops cabling and wiring standards for networking.
It is a protocol that establishes how computers within a local network communicate.
It is an organization that enables individuals and businesses to connect to the Internet.
It is a networking device that combines the functionality of several different networking devices in one.

15
What must be identical on all devices in a WLAN for successful wireless communication between the devices?
SSID
antenna type
network mode
wireless NIC driver

16
All hosts within a domain receive the same frame that originates from one of the devices. The domain is also bounded by routers. What type of domain is this?
broadcast
collision
local
multicast

17


Refer to the exhibit. Which statement is true based on the information that is shown in the exhibit?
All wireless devices that are connected to this AP must have an assigned SSID of College.
Any wireless client that is attached to this AP must have the same IP address and SSID.
The AP is not physically wired to the local LAN.
This configuration is found only in an ad hoc wireless network.

18


Refer to the exhibit. The security policy of an organization allows employees to connect to the office intranet from their homes. Which type of security policy is this?
acceptable use
incident handling
network maintenance
remote access

19
Which wireless protocol is used for encryption?
EAP
Open
PSK
WEP

20


Refer to the exhibit. An educational institution needs to connect PC systems that use private IP addressing to the Internet. They have multiple systems that need to access the Internet, but were only able to purchase one public IP address. What should be activated on the Linksys integrated router to achieve this goal?
authentication
DHCP
encryption
firewall
NAT
WEP

21
What is an advantage of purchasing a custom-built computer?
It is beneficial for less knowledgeable consumers.
The waiting period for assembly is negligible.
The cost is lower compared to a computer that has been preassembled.
The user can specify high-performance components to meet specific needs.

22


Refer to the exhibit. PC1 sends a data packet to PC4. When the router forwards the data out Fa0/1, what destination MAC address will the router place in the frame?
0050.0FA9.CB47
0050.E208.A761
0200.5455.4E01
0200.545D.25F7

23
Which type of computer has an integrated mouse?
desktop
laptop
mainframe
server
pocket PC

24


Refer to the exhibit. What is the reason that the host is unable to connect to the Internet?
DHCP needs to be enabled on the router.
The router has an incorrect DHCP starting address.
The IP address on the host is in the wrong network.
The host is configured with an incorrect gateway.

25
What is the function of a physical topology map?
records IP addressing of each host
records hostnames and applications
organizes groups of hosts by how they use the network
shows where wiring is installed and the locations of network devices

26
What is true about a wireless access point that is equipped with an omnidirectional antenna?
concentrates signal in one direction
typically used in bridging applications
radiates the signal equally in all directions
provides the greatest transmission distance of all antenna types that are used by APs

27


Refer to the exhibit. A ping command that was initiated from the local PC to the file server at IP address 209.165.201.5 succeeded. However, a ping that was initiated from the file server to the local PC was unsuccessful. What could cause the ping command that was initiated from file server to fail?
The file server is down.
The integrated router has failed.
NAT has been enabled on the integrated router.
A security measure is blocking access that initiates from the server.
The DSL modem failed to provide an IP address for the local PC.

28
When are leased lines typically used?
when low bandwidth is required
for home and small business connectivity
when a dedicated digital data line is necessary
as a less expensive option to cable and DSL modem service

29
What is the default subnet mask for an IP address of 64.100.19.14?
255.0.0.0
255.255.0.0
255.255.255.0
255.255.255.255

30
Which protocol is used by a client to browse the web server?
FTP
HTTP
POP
SMTP

31


Refer to the exhibit. If H4 sends a message to H1 and the destination MAC address is in the MAC table for both Switch1 and Switch2, which host devices will receive the message?
only H1
hosts H1 and H4
all hosts that are connected to Switch1
all hosts that are connected to Switch1 and Switch2

32
Which protocol is used to transfer files among network devices and perform file-management functions?
DNS
FTP
HTML
HTTP

33
How does a crossover cable connect two routers?
It connects the pins that are used for receiving on one router to the pins that are used for receiving on the other router.
It connects the pins that are used for transmitting on one router to the pins that are used for receiving on the other router.
It disconnects the transmit pins and uses only the receive pins.
It uses the same pins for transmitting and receiving.

34
Which two values represent the network number and default mask for the address 209.165.200.225? (Choose two.)
209.0.0.0
209.165.0.0
209.165.200.0
255.0.0.0
255.255.0.0
255.255.255.0

35
Identify two causes of physical layer network problems. (Choose two.)
logical addressing issues
improperly terminated cables
cables plugged into wrong ports
incorrect MAC address assigned
packets received out of sequence
incorrect subnet mask on an interface

36
A local PC has the correct configuration that is required to access the network. A ping command that is sourced at the PC does not receive a response from a remote device. Which operating system command might be used to determine where the connection failed?
netstat
tracert
ipconfig
nslookup

37
What type of cable would be required to connect a Linksys router to a wired PC?
crossover cable
rollover cable
serial cable
straight-through cable

38
What is the function of CSMA/CA on a wireless Ethernet network?
to prevent collisions
to broadcast messages
to select the least congested channel
to establish an ACK between devices

39
Which adapter card would be required for a PC to exchange information with other PCs on a LAN?
NIC
video card
sound card
internal modem

40
What are two examples of peripheral output devices? (Choose two.)
barcode reader
digital camera
external DVD
headphones
printer

41
TCP/IP data transmission between the source and destination host is de-encapsulated in four steps:

A. The TCP header is removed.
B. Bits are decoded and the destination MAC address is recognized.
C. The IP header is removed and the contents are passed to the next layer.
D. The Ethernet header and trailer are removed.

What is the correct sequence of these steps?
A, B, C, D
A, C, B, D
B, C, D, A
B, D, C, A
C, A, B, D

42
Which two statements are true about local applications? (Choose two.)
They run on the network.
An example of a local application is e-mail.
They are accessed from a remote computer.
They are stored on the local hard disk.
They run on the computer where they are installed.

43
What two commands can be used to form a new binding if client information does not agree with the DHCP client table? (Choose two.)
ipconfig /release
ipconfig /all
ipconfig /flushdns
ipconfig /renew
ipconfig

44
What describes the external IP address that is obtained by a router through a cable or DSL modem?
a public address that is obtained from ICANN
a private address that is manually configured by the administrator
a public address that is obtained through DHCP from the ISP
a private address that converts to a public address on the internal LAN

45
A user in a small office is unable to connect to the Internet. The user examines the physical connections to the ISR, a Linksys WRT300N, and notices a solid green LED on the port that is wired to the computer. What does the LED indicate about the current state of the port?
The ISR is making adjustments to the port.
The device is plugged in and traffic is flowing.
The computer is plugged in but no traffic is flowing.
The ISR does not detect that the computer is plugged in.

46
A network administrator wishes to deploy a small network without using static IP addresses on employee workstations. However, all employees need Internet access. Which two of these services must be configured to meet network requirements? (Choose two.)
FTP
DHCP
HTTPS
NAT
HTTP

47
Which three statements describe an IP address? (Choose three.)
An IP address is known as a logical address.
An IP address uses a 30-bit addressing scheme.
An IP address is found in the Layer 2 header during transmission.
The network portion of an IP address is burned into a network interface card.
An IP address is unique within the same local network.
The network portion of an IP address will be the same for all hosts that are connected to the same local network.

48
Which type of network supports DHCP and DNS services for network users in a network domain?
client/server
peer-to-peer
hierarchical
ad hoc

49
For the second time in a week, workstations on a LAN are not able to log into the server. The technician fixed the problem the first time, but cannot remember the steps taken to solve it. What aspect of the troubleshooting process has the technician neglected?
identifying the problem
asking end-users questions
documenting the troubleshooting process
using structured techniques to solve a problem

50
What type of message is sent to a specific group of hosts?
static
unicast
dynamic
multicast
broadcast

51
What is specified by the host bits in an IP address?
broadcast identity of the network
identity of the computer on the network
network that is being addressed
network to which the host belongs

52


Refer to the exhibit. A user sets up a home network and uses a crossover cable from Switch1 to the Internet port on the ISR. However, there is no connection between the host H1 and the server. What should the user do in order to establish a connection?
Replace the cable with a console cable.
Replace the cable with a rollover cable.
Replace the failed crossover cable with a working crossover cable.
Replace the cable with a straight-through cable.


T


0 komentar:

Posting Komentar